Packet Tracer

In: Computers and Technology

Submitted By sueaziz
Words 1346
Pages 6
Packet T P Tracer - Connec a Router to a LAN ct
Topology T

Addressing Table A g
Device Interface G0 0/0 R1 R G0 0/1 S0 0/0/0 (DCE) G0 0/0 R2 R G0 0/1 S0 0/0/0 PC1 P PC2 P PC3 P PC4 P NIC NIC NIC NIC IP Addr ress 192.168.10 0.1 192.168.11 1.1 209.165.20 00.225 10.1.1.1 10.1.2.1 209.165.20 00.226 192.168.10 0.10 192.168.11 1.10 10.1.1.10 10.1.2.10 Subnet Mask S 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 Default G Gateway N/A N/A N/A N/A N/A N/A 192.168.10.1 192.168.11.1 10.1.1.1 10.1.2.1

Objectives O
Part 1: Di isplay Route Information er Part 2: Co onfigure Rou uter Interface es Part 3: Ve erify the Con nfiguration

© 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Public. d/or ed. ent

Page 1 of 5

Packet Tracer - Connect a Router to a LAN

Background
In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations. Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands.

Part 1: Display Router Information
Step 1: Display interface information on R1.
Note: Click a device and then click the CLI tab to access the command line directly. The console password is cisco. The privileged EXEC password is class. a. Which command displays the statistics for all interfaces configured on a router? b. Which command displays the information about the Serial 0/0/0 interface only? c. Enter the command to display the statistics for the Serial 0/0/0 interface on R1 and answer the following questions: 1) What is the IP…...

Similar Documents

Tracer Study

...TERTIARY EDUCATION COMMISSION Graduate Tracer Study 2011 A Preliminary Report February 2012 Table of Contents List of Tables ......................................................................................................................................... ii List of Figures........................................................................................................................................ ii List of Acronyms..................................................................................................................................iiii 1. 2. 3. 4. 5. 6. 7. 8. 9. Preface…………………………………………………………………………………………………………………………………………….1 Background……………………………………………………………………………………………………………………………………..1 Objectives of the Tracer Study.............................................................................................................. 2 Methodology......................................................................................................................................... 3 Population and Sample Design.............................................................................................................4 Survey Implementation.........................................................................................................................5 Coverage of this Preliminary Report.....................................................................................................5 Graduates' Characteristics......................

Words: 14039 - Pages: 57

Packet Switching

... Алматы 2012 СОДЕРЖАНИЕ 1 Annotation 3 2 PACKET SWITCHING 3 3 КОММУТАЦИЯ ПАКЕТОВ 6 ТЕРМИНОЛОГИЧЕСКИЙ СЛОВАРЬ 10 СПИСОК ЛИТЕРАТУРЫ 11 Annotation This text describes packet switching, its modes and history. The main topic of this text is how packet switching works. Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets. The concept of switching small blocks of data was first explored by Paul Baran in the early 1960s. Independently, Donald Davies at the National Physical Laboratory (NPL) in the UK had developed the same ideas a few years. Two major packet switching modes exist; (1) connectionless packet switching, also known as datagram switching, and (2) connection-oriented packet switching, also known as virtual circuit switching. In the first case each packet includes complete addressing or routing information. 1 PACKET SWITCHING Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets. First proposed for military uses in the early 1960s and implemented......

Words: 3704 - Pages: 15

Packet

...Chapter 2 Packet 4 Review notes: Internal rhyme: __________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Alliteration: ___________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Onomatopoeia:___________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Read the biography of Edgar Allan Poe on pages 253-4 and list 4 facts about his life. a. b. c. d. “The Raven” p. 274-277 1. What is the setting of the poem (time and place)? 2. What is the rhyme scheme in the first stanza? Does Poe maintain this rhyme scheme? 3. List all the questions that the narrator asks the raven. 4. What does the narrator say he is trying to do in lines 9-10? 5. In the third stanza, list all the words that are examples of alliteration. What effect does this alliteration have on the poem? 6. How does the significance of the word “nevermore” change throughout the poem? 7. What is the mood throughout the poem? What images help establish this mood? 8. In line 101, what do you think the narrator means when he begs the bird to “Take thy beak from out...

Words: 294 - Pages: 2

Tracer Study

...lovingly dedicated to the researcher’s prospective parents who have been our constant source of inspiration. They have given the researchers the drive and to tackle any task with enthusiasm and determination. Without their love and support this project would not have been made possible. John Mielton Avila Grace Bulawan Ruciel Calabia Kathyrine Canzana Jalelee Hermosura Erickson Hipe Merci Lliana Ann Macazar Janela Mae Sarmiento ABSTRACT Title : The Philippine Normal University Lopez Quezon Graduates Batches 2009-2011: A Tracer Study Author : Avila, John Mielton., Bulawan, Grace E., Calabia, Ruciel A., Canzana, Kathyrine F., Hermosura, Jalelee B., Hipe, Ericson V., Macazar, Merci Llana Ann A., Sarmiento, Janela Mae P., Bachelor of Elementary Education, Philippine Normal University, Quezon Campus A.Y. 2012-2013 Keywords : Tracer, Tracer Study, Graduates, Batches, Alumni, Status This study is focued on the current status of the Alumni batches 2009-2011 of Philippni Normal University Lopez Quezon. The researchers’ used the descriptive design for this research and utilized qualitative method in order to determine the current status of the Alumni batche 2009-2011. The researchers used instruments, questionnaires and online survey for the respondents. The researchers used stratified sampling technique due to the needs of the study. The statistical tools used in this study included the frequency count,......

Words: 2275 - Pages: 10

Packet Sniffing

... A SEMINAR REPORT ON | PACKET SNIFFER | SUBMITTED BY SUBMITTED ONKUNAL GOPAL THAKUR MAY 14,2010VISHAL SHIRGUPPIJUSTIN FRANCISSHAZIA ALIUNDER THE GUIDANCE OF MR. SUNIL SURVEFR. CONCEICAO RODRIGUES COLLEGE OF ENGINEERINGBANDRA(W)MUMBAI – 400 050 | CERTIFICATE This is to certify that, Mr. KUNAL GOPAL THAKUR , Mr. VISHAL SHIRGUPPI ,Mr. JUSTIN FRANCIS and Ms. SHAZIA ALI have completed their project on PACKET SNIFFER satisfactorily in partial fulfillment under the department of Computer Engineering during academic year 2009-2010. ____________________________ Teacher In-Charge ACKNOWLEDGEMENT We would like to express our sincere thanks and gratitude to our guide Mr. Sunil Surve for his valuable guidance and suggestions. We are highly indebted to him for providing us an excellent opportunity to learn and present our studies in the form of this seminar report. We take this opportunity to thank the members of the teaching and non-teaching staff of Fr.CRCE for the timely help extended by them. Lastly thanking our parents, for their morale support and encouragement. Kunal Gopal Thakur Vishal Shirguppi Justin Francis Shazia Ali ABSTRACT: Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or......

Words: 3356 - Pages: 14

Hiring Packet

...8610 Hansen Ave. Shakopee, MN 55379 BIFFS, INC. Instructions for New Hire Packet – Applicant Directions 1. Page 2 – Checklist - Fill in or verify your name and social security number. Supervisor to fill in the date of hire & Company assigned (EID) employee identification number. 2. Pages 3 – 7 – DOT Application - must all be completed including 10 years (if CDL holder); 3 years (if non-CDL holder) of previous work history, addresses, & phone numbers. ** If there is any time frame for unemployment or selfemployment please list. DOT is looking for a complete trail of information provided by the driver representing where they have been from date to date. Please complete this form and provide a signature/ date at bottom of page 7. Read “Driver Rights” provided by your company. 3. Page 8 - Previous Employer form – Only sign the top box on the first page where it states Applicant signature and date. Company / Supervisors will send out to the previous employers listed on driver’s application. 4. Page 9 – DISCLOSURE - sign and date bottom *Company is required to order and obtain a current MVR for driver prior to hiring or being moved into a driving position. Driver written authorization is required. 5. Page 10 top Record of Violations form – Fill in any moving traffic violations you have had within the past 12 months; provide a signature & date. If no violations check box. Page 10 bottom – Annual Review (SKIP) to be completed by supervisor with a current MVR. MVR=Motor...

Words: 8061 - Pages: 33

Tracer Study

...TRACER STUDY OF BUSINESS ADMINISTRATION GRADUATES OF CAPITOL UNIVERSITY 2008-2010 A Research Paper Presented to The Faculty of the College of Business Administration Capitol University Cagayan de Oro City __________________ In Partial Fulfilment Of the Requirements for the Course ED12 RESEARCH METHODOLOGY PROF. CECILLE C. DEUDA (Professor) ________________ By: Arbuis, Arra Jynne S. Camero, Jeffrey Lou Q. Linogao, Rosario R. Toñacao, Cejane B. OCTOBER 2012 TABLE OF CONTENTS Page Title Page i Acknowledgement ii ABSTRACT iii List of Tables CHAPTER 1 Introduction 1 1.1 Conceptual Framework 3 1.2 Statement of the problem 4 1.3 Scope and Limitation 5 1.4 Significance of the study 6 1.5 Definition of terms 6 2 Review of Related Literature 9 3 Research Design and Methodology 12 3.1 Research Design 12 3.2 Methodology 12 3.2.1 Respondents of the study 12 3.2.2 Research Instruments Used 13 3.2.3 Statistical Treatment 14 4...

Words: 7296 - Pages: 30

Implementación de Redes En Packet Tracer

...presentación 7 4.2.1.6. Nivel de sesión 7 4.2.1.7. Nivel de transporte 8 4.2.2. Experiencia 2 10 4.2.2.1. Router: 10 4.2.2.2. Switch 11 4.2.2.3. Hub y Repeater 12 4.2.2.4. Access Point 12 4.2.3. Experiencia 3 13 4.2.4. Experiencia 4 17 4.2.4.1. Red 1 17 4.2.4.2. Red 2 18 5. CONCLUSIÓN 20 6. REFERENCIAS 21 1. RESUMEN EJECUTIVO Se da a conocer la forma de implementación de redes virtuales en Packet Tracer, especificando características de los modelos y funcionalidades de cada dispositivo que en la plataforma se puede utilizar para montar redes. Posteriormente se presenta el Modelo OSI, donde se describe las funciones claras y específicas, de cada una de las capas existentes en el modelo, la capa de aplicación, presentación, sesión, red, enlace de datos y físico. Para facilitar la comprensión de la información entregada, se muestran algunas imágenes, clarificando los conceptos y para indicar el orden de trasporte de datos del mismo. A los conocimientos adquiridos del modelo OSI y la plataforma virtual Packet Tracer, se sumará un análisis y descripción detenido y detallado acerca de los protocolos existentes en la plataforma y se clasificarán los mismos en las capas del modelo estudiado. Finalmente se hace una encarecida invitación a la lectura del informe y que esta información sea de verdad utilidad complementaria a cualquier conocimiento previo. 2. INTRODUCCIÓN En el presente informe, se da a conocer variadas......

Words: 3576 - Pages: 15

A Tracer Study Prosoasa

...BACKGROUND Introduction A nation’s economy runs on the knowledge and skills of its people. The requirements for skills evolve with external investment, technological advances and globalization. To keep pace with changes, people need to acquire skills to be productive and earn a living and all of these can be achieved through education. Education is the most important mechanism for the empowerment of people for their socio-economic, political, and technological development. The learning environment of higher education institutions must take cognizance of this in structuring their course programs. For the purpose of quality assurance of course programs, higher education institutions can contribute meaningfully by applying the principles of tracer study to create sustainable learning empowerment environment for the continuous professional development of past students. While many higher education institutions provide training to a variety of clients, most forget them as soon as they graduate and leave the institution’s environment with no means to contact them. Employability upon graduation an over the long term is, understandably, the major priority for the vast majority of our University students. Over the past decades or so the University has increasingly offered a wide spectrum of higher education courses that provide students with the necessary tools enabling them to develop their employability skills, to heighten their awareness of these skills and to improve......

Words: 3893 - Pages: 16

Tracer

...status of Rank and File position. The data also showed in the study revealed that majority of the respondents has ventured in the field of Industrial/Organizational Psychology/Human Resources/Organizational Development setting. More so, most of the respondents have strongly agreed that their course helped them build their character. That their course has gave the respondents more confidence in getting hired. The researchers recommend through this study that despite the Psychology graduates preference over Industrial/Organizational Psychology/Human Resources/Organizational Development settings, they should realized to try other fields the psychology graduates can venture on like in the field of marketing and teaching. Furthermore, more tracer studies should be carried out on a regular basis. This is to monitor the working conditions and status of the alumni and other related factors of their employment in order for the Department of Psychology and the University to be informed....

Words: 305 - Pages: 2

Packet Switching

...Packet Switching The concept of packet switching was first developed in the early 1960s, by researchers at the Massachusetts Institute of Technology. Packet switching is the dividing of messages into packets before they are sent, transmitting each packet individually, and then reassembling them into the original message once all of them have arrived at the intended destination. Packets are the fundamental unit of information transport in all modern computer networks, and increasingly in other communications networks as well. Each packet, which can be of fixed or variable size depending on the protocol, consists of a header, body, and a trailer. The body contains a segment of the message being transmitted. The header contains a set of instructions regarding the packet's data, the number of packets into which the message has been divided, the identification number of the particular packet, the protocol, packet length and synchronization. Packets are typically routed from source to destination using network switches and routers. Each packet contains address information that identifies the sending computer and intended recipient. Using these addresses, network switches and routers determine how best to transfer the packet to its destination Pros and Cons of Packet Switching Packet switching is the alternative to circuit switching protocols used historically for telephone (voice) networks and sometimes with ISDN connections. Compared to circuit switching, packet......

Words: 307 - Pages: 2

Packet Tracer

...------------------------------------------------- Name: Amanpreet Singh Date: 05/31/2015 Week# 4 ------------------------------------------------- Activity# 6.6.1.2 – Skills Integration Challenge ------------------------------------------------- Activity Report 1. Write a short paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, what challenges you faced. ------------------------------------------------- This week’s packet tracer was arguably difficult but at the same time, they were very informative and educational. I had to refer to the book several times to learn the commands for configuration. In the end, it was a long packet tracer but it surely helped and I am glad I learned from it. ------------------------------------------------- Packet Tracer – Skills Integration Challenge Addressing Table Device | Interface | IP Address | Subnet Mask | Default Gateway | VLAN | R1 | S0/0/0 | 172.31.1.2 | 255.255.255.0 | N/A | N/A | | G0/0.10 | 172.31.10.1 | 255.255.255.0 | N/A | 10 | | G0/0.20 | 172.31.20.1 | 255.255.255.0 | N/A | 20 | | G0/0.30 | 172.31.30.1 | 255.255.255.0 | N/A | 30 | | G0/0.88 | 172.31.88.1 | 255.255.255.0 | N/A | 88 | | G0/0.99 | 172.31.99.1 | 255.255.255.0 | N/A | 99 | S1 | VLAN 88 | 172.31.88.33 | 255.255.255.0 | 172.31.88.1 | 88 | PC-A | NIC | 172.31.10.21 | 255.255.255.0 | 172.31.10.1 | 10 | PC-B | NIC |......

Words: 493 - Pages: 2

Acme Packet

...accounting conventions. These figures are bound to follow the concepts of Prudence and Accruals. Which says that expense should be recorded when it can be foresee. Whereas cash flows statement only consists of all the cash movements within the business. Cash flow tends to deduct or add any movements which cannot be justifiable in monetary term or within which the cash is not involved. ii. Provide a likely and economically sound reason why this company has both an extremely high Gross Margin and a negative Operating Margin. Acme Packet is in session delivery network solutions and is vulnerable to both technological advancement and marketing its product. The fact that Gross Margin is high because the cost of providing this service is low but generates high profit margin. But however due to vulnerability to technological advancements they must incur tons of money into their research and development program in order to upgrade its solutions. Acme Packet must also have to incur heavy marketing cost in order to showcase their solutions due to fierce competition among the players in IT industry. Gross Margin is (Total Revenue minus Total Cost of Goods Sold) divided by Total Revenue. Operating Margin is (Total Revenue minus Total Operating Expenses) divided by Total Revenue. Mechanics: iii. Why do we add back a decrease to Accounts Receivable? A decrease in Accounts Receivable indicates that one of our customer had paid his owed account. When a customer pay his /......

Words: 420 - Pages: 2

Tracer Study

...A TRACER STUDY ON THE EMPLOYMENT STATUS FOR THE COLLEGE OF BUSINESS ADMINISTRATION AND COMPUTER STUDIES IN CAPITOL UNIVERSITY FOR S.Y 2010-2015 A RESEARCH Presented to the Graduate Faculty of Doctor of Management Capitol University Cagayan de Oro City In Partial Fulfillment of the Requirements for the Degree DOCTOR OF MANAGEMENT By RENZ P. AGUHOB LOUELLA YAP BUOT KERWIN SALVADOR P. CARAGOS CJ RANIDO March 2016 APPROVAL SHEET This research, entitled “A Tracer Study on the Employment Status for the College of Business Administration and Computer Studies in Capitol University for S.Y. 2010-2015” by Renz P. Aguhob, Louella Yap Buot, Kerwin Salvador P. Caragos and Cyril Jane Ranido in partial fulfillment of the requirements for the degree of Doctor of Management, has been examined and recommended for Oral Examination. JOEL D. POTANE, Ph.D. Adviser ------------------------------------------------- Approved in partial fulfillment of the requirements for the degree, Doctor of Management, by the Oral Examination Committee. _________________________________ Chairman ____________________________ ____________________________ Member Member Accepted in partial fulfillment of the requirements for the degree of Doctor of Management. Edwin C. Du, Ph.D Dean, Graduate School CHAPTER 1 THE PROBLEM Introduction The emergence of globalization has made the world a smaller village through breaking down the borders between countries. This phenomenon brought......

Words: 4515 - Pages: 19

Packet Filtering

...Packet Filtering Index Should arriving packet be allowed in? Should a departing packet be let out? Filter packet-by-packet, making decisions to forward/drop a packet based on: Functions of Packet Filter Control: Allow only those packets that you are interested in to pass through. Security: Reject packets from malicious outsiders Watchfulness: Log packets to/from outside world In a software firewall, packet filtering is done by a program called a packet filter. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing (called DROP) or allow it to pass (called ACCEPT). There are three ways in which a packet filter can be configured, once the set of filtering rules has been defined. In the first method, the filter accepts only those packets that it is certain are safe, dropping all others. This is the most secure mode, but it can cause inconvenience if legitimate packets are inadvertently dropped. In the second method, the filter drops only the packets that it is certain are unsafe, accepting all others. This mode is the least secure, but is causes less inconvenience, particularly in casual Web browsing. In the third method, if the filter encounters a packet for which its rules do not provide instructions, that packet can be quarantined, or the user can be specifically queried concerning what should be done with it. This can be inconvenient if it causes numerous dialog boxes to......

Words: 256 - Pages: 2